S3BD: Secure semantic search over encrypted big data in the cloud
暂无分享,去创建一个
[1] MangoldChristoph. A survey and classification of semantic search approaches , 2007 .
[2] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[3] Cong Wang,et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..
[4] Cong Wang,et al. Achieving usable and privacy-assured similarity search over outsourced cloud data , 2012, 2012 Proceedings IEEE INFOCOM.
[5] Keke Gai,et al. Spoofing-Jamming Attack Strategy Using Optimal Power Distributions in Wireless Smart Grid Networks , 2017, IEEE Transactions on Smart Grid.
[6] N. Cao,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.
[7] Antonio Ruiz-Martínez,et al. Architectures and Protocols for Secure Information Technology Infrastructures , 2014 .
[8] James P. Callan,et al. Topic-based Index Partitions for Efficient and Effective Selective Search , 2010, LSDS-IR@SIGIR.
[9] Karl Aberer,et al. Contextualized ranking of entity types based on knowledge graphs , 2016, J. Web Semant..
[10] Zenggang Xiong,et al. Privacy-preserving multi-channel communication in Edge-of-Things , 2018, Future Gener. Comput. Syst..
[11] Saman A. Zonouz,et al. RESeED: Regular Expression Search over Encrypted Data in the Cloud , 2014, 2014 IEEE 7th International Conference on Cloud Computing.
[12] J. A. Hartigan,et al. A k-means clustering algorithm , 1979 .
[13] Zhihua Xia,et al. Privacy- Preserving Keyword-based Semantic Search over Encrypted Cloud Data , 2014 .
[14] Nora Cuppens-Boulahia,et al. Semantic search over encrypted data , 2013, ICT 2013.
[15] Teng-Sheng Moh,et al. Efficient semantic search over encrypted data in cloud computing , 2014, 2014 International Conference on High Performance Computing & Simulation (HPCS).
[16] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[17] Léo Ducas,et al. FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second , 2015, EUROCRYPT.
[18] Martha Palmer,et al. Verb Semantics and Lexical Selection , 1994, ACL.
[19] Magdy A. Bayoumi,et al. High Performance On-demand Video Transcoding Using Cloud Services , 2016, 2016 16th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid).
[20] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[21] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[22] Mohsen Amini Salehi,et al. Big Data in the Cloud , 2019, Encyclopedia of Big Data Technologies.
[23] Ricardo Baeza-Yates,et al. Efficiency trade-offs in two-tier web search systems , 2009, SIGIR.
[24] Keke Gai,et al. Blend Arithmetic Operations on Tensor-Based Fully Homomorphic Encryption Over Real Numbers , 2018, IEEE Transactions on Industrial Informatics.
[25] Ian H. Witten,et al. Human-competitive tagging using automatic keyphrase extraction , 2009, EMNLP.
[26] Luiz André Barroso,et al. Web Search for a Planet: The Google Cluster Architecture , 2003, IEEE Micro.
[27] Matthew Crosby,et al. Association for the Advancement of Artificial Intelligence , 2014 .
[28] Peter Baumann,et al. Spatio-Temporal Gridded Data Processing on the Semantic Web , 2015, 2015 IEEE International Conference on Data Science and Data Intensive Systems.
[29] Enrico Motta,et al. SemSearch: A Search Engine for the Semantic Web , 2006, EKAW.
[30] R. M. Suresh,et al. A Comparative Study on the Effectiveness of Semantic Search Engine over Keyword Search Engine using TSAP Measure , 2012, CloudCom 2012.
[31] Ramanathan V. Guha,et al. Semantic search , 2003, WWW '03.
[32] Vassilis Christophides,et al. RQL: a declarative query language for RDF , 2002, WWW.
[33] Christoph Mangold,et al. A survey and classification of semantic search approaches , 2007, Int. J. Metadata Semant. Ontologies.
[34] Ping Wang,et al. Offline Dictionary Attack on Password Authentication Schemes Using Smart Cards , 2013, ISC.
[35] W. Bruce Croft,et al. Cluster-based retrieval using language models , 2004, SIGIR '04.
[36] Eu-Jin Goh,et al. Secure Indexes , 2003, IACR Cryptol. ePrint Arch..
[37] Cong Wang,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.
[38] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[39] Hari Balakrishnan,et al. CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.
[40] Pieter H. Hartel,et al. Computationally Efficient Searchable Symmetric Encryption , 2010, Secure Data Management.
[41] Reza Fathi,et al. User-Friendly and Secure Architecture (UFSA) for Authentication of Cloud Services , 2015, 2015 IEEE 8th International Conference on Cloud Computing.
[42] W. Bruce Croft,et al. Cluster-based language models for distributed retrieval , 1999, SIGIR '99.
[43] Mohsen Amini Salehi,et al. S3C: An architecture for space-efficient semantic search over encrypted data in the cloud , 2016, 2016 IEEE International Conference on Big Data (Big Data).
[44] Alexander Dekhtyar,et al. Information Retrieval , 2018, Lecture Notes in Computer Science.
[45] W. John Wilbur,et al. The automatic identification of stop words , 1992, J. Inf. Sci..
[46] Saman A. Zonouz,et al. TSC: Trustworthy and Scalable Cytometry , 2015, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems.
[47] Saman A. Zonouz,et al. RESeED: A secure regular‐expression search tool for storage clouds , 2017, Softw. Pract. Exp..
[48] William P. Birmingham,et al. Architecture of a metasearch engine that supports user information needs , 1999, CIKM '99.
[49] Robert Villa,et al. The effectiveness of query-specific hierarchic clustering in information retrieval , 2002, Inf. Process. Manag..
[50] Stephen E. Robertson,et al. GatfordCentre for Interactive Systems ResearchDepartment of Information , 1996 .
[51] Jeff Heflin,et al. Searching the Web with SHOE , 2000 .